Back to Search Start Over

A survey on post‐quantum based approaches for edge computing security.

Authors :
Karakaya, Aykut
Ulu, Ahmet
Source :
WIREs: Computational Statistics. Jan/Feb2024, Vol. 16 Issue 1, p1-36. 36p.
Publication Year :
2024

Abstract

With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities. Therefore, in order to take advantage of quantum systems, existing systems that are already secure must also be secure in the post‐quantum scenario. One of these systems is edge computing. There are challenges in terms of computational power for the implementation of pre‐ and post‐quantum methods in structures with resource‐constrained devices. This article reviews the post‐quantum security threats of edge devices and systems and the secure methods developed for them. Although there is relatively little research in this field, it remains relevant. In the studies reviewed, lattice‐based approaches are often highlighted for making edge systems quantum‐resistant. Additionally, these studies indicate that there has been an increasing trend in this field in recent years. This article is categorized under:Applications of Computational Statistics > Defense and National SecurityAlgorithms and Computational Methods > Networks and Security [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
19395108
Volume :
16
Issue :
1
Database :
Academic Search Index
Journal :
WIREs: Computational Statistics
Publication Type :
Academic Journal
Accession number :
175669959
Full Text :
https://doi.org/10.1002/wics.1644